{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:24Z","timestamp":1750220004993,"version":"3.41.0"},"reference-count":9,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2022,1,7]],"date-time":"2022-01-07T00:00:00Z","timestamp":1641513600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["GetMobile: Mobile Comp. and Comm."],"published-print":{"date-parts":[[2022,1,7]]},"abstract":"<jats:p>I believe that the Internet of Tiny Things (IoTT) will be the next big driver of the computing and semiconductor industry - imagine applications such as smart city, home sensors, wearables, implantables, single-use electronic tags for pharmaceuticals and produce, and more. Trillions of tiny devices may be needed every year to enable these applications, while meeting extreme requirements in terms of cost (sometimes only a few cents), power (often self-powered), and trust (often physically accessible and producing sensitive data). Our research over last few years has been focused on enabling an internet of these tiny things by addressing the unique cost, power, and trust challenges of these devices.<\/jats:p>","DOI":"10.1145\/3511285.3511289","type":"journal-article","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T23:15:51Z","timestamp":1641942951000},"page":"12-17","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["When Tiny Goes Big"],"prefix":"10.1145","volume":"25","author":[{"given":"Rakesh","family":"Kumar","sequence":"first","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Champaign, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,1,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Hari Cheruppali Henry Duwe Weidong Ye Rakesh Kumar John Sartori. 2017. Bespoke processors for applications with ultra-low area and power constraints ISCA.  Hari Cheruppali Henry Duwe Weidong Ye Rakesh Kumar John Sartori. 2017. Bespoke processors for applications with ultra-low area and power constraints ISCA.","DOI":"10.1145\/3079856.3080247"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DAC18074.2021.9586090"},{"key":"e_1_2_1_3_1","doi-asserted-by":"crossref","unstructured":"Hari Cheruppali Henry Duwe Weidong Ye Rakesh Kumar John Sartori. 2017. Determining application-specific peak power and energy requirements for ultra-low power processors ASPLOS.  Hari Cheruppali Henry Duwe Weidong Ye Rakesh Kumar John Sartori. 2017. Determining application-specific peak power and energy requirements for ultra-low power processors ASPLOS.","DOI":"10.1145\/3037697.3037711"},{"key":"e_1_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Hari Cheruppali Rakesh Kumar John Sartori. 2016. Exploiting dynamic timing slack for energy efficiency in ultra-low power embedded systems ISCA.  Hari Cheruppali Rakesh Kumar John Sartori. 2016. Exploiting dynamic timing slack for energy efficiency in ultra-low power embedded systems ISCA.","DOI":"10.1109\/ISCA.2016.64"},{"key":"e_1_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Hari Cheruppali Henry Duwe Weidong Ye Rakesh Kumar John Sartori. 2017. Enabling effective module-oblivious power gating for embedded processors HPCA.  Hari Cheruppali Henry Duwe Weidong Ye Rakesh Kumar John Sartori. 2017. Enabling effective module-oblivious power gating for embedded processors HPCA.","DOI":"10.1109\/HPCA.2017.48"},{"key":"e_1_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Hari Cheruppali Henry Duwe Weidong Ye Rakesh Kumar John Sartori. 2017. Softwarebased gate-level information flow security for IoT Systems MICRO.  Hari Cheruppali Henry Duwe Weidong Ye Rakesh Kumar John Sartori. 2017. Softwarebased gate-level information flow security for IoT Systems MICRO.","DOI":"10.1145\/3123939.3123955"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Wooseok Choi Matt Tomei Jose Vicarte Pavan Hanumolu and Rakesh Kumar. 2018. Guaranteeing local differential privacy on ultralow power systems ISCA.  Wooseok Choi Matt Tomei Jose Vicarte Pavan Hanumolu and Rakesh Kumar. 2018. Guaranteeing local differential privacy on ultralow power systems ISCA.","DOI":"10.1109\/ISCA.2018.00053"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00028"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00019"}],"container-title":["GetMobile: Mobile Computing and Communications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511285.3511289","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511285.3511289","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:03Z","timestamp":1750182663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511285.3511289"}},"subtitle":["A Computer Architect's View of the Emerging Internet of Tiny Things"],"short-title":[],"issued":{"date-parts":[[2022,1,7]]},"references-count":9,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2022,1,7]]}},"alternative-id":["10.1145\/3511285.3511289"],"URL":"https:\/\/doi.org\/10.1145\/3511285.3511289","relation":{},"ISSN":["2375-0529","2375-0537"],"issn-type":[{"type":"print","value":"2375-0529"},{"type":"electronic","value":"2375-0537"}],"subject":[],"published":{"date-parts":[[2022,1,7]]},"assertion":[{"value":"2022-01-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}